@PSUStevens headshot

@PSUStevens blog

You are reading the blog of @PSUStevens.
You can reach me through one of the social accounts below.

How to Encrypt a VM Using vSphere Encryption

This post will walk through the steps to encrypt a VM using vSphere encryption. Encryption keys are obtained from a deployed Entrust KeyControl v5.4. KMS cluster

PSUStevens

3 minutes read

VMware Encryption

To get started here is what you will need to complete the steps in this post:

Now, let’s get started…


Select a VM to Encrypt

  1. Right click a VM and select VM Policies, Edit VM Storage Policies

    Edit VM Storage Policies

    Edit VM Storage Policies


Encrypt the Entire VM?

If you are content with encrypting the entire VM then follow the step in this section.

  1. Select VM Encryption Policy from the VM storage policy dropdown list and click OK.

    VM Encryption Policyr

    VM Encryption Policy

During this phase vCenter requests an encryption key from KeyControl and presents it to the ESX host where the VM is assigned. This key is referred to as the Key Encryption Key (KEK). The ESX host creates a Data Encryption Key (DEK) and protects it by wrapping the DEK with the KEK. Then the ESX host begins encrypting it.

You can hop over the next section.


Encrypt Individual VMDKs?

If you have a need to encrypt specific VMDKs then follow the steps in this section.

  1. Click the Configure per disk slider. It will appear green when per-VMDK selection is enabled.

  2. Select VM Encryption Policy from the VM storage policy dropdown list for each VMDK you want to encrypt.

    NOTE: You will NOT be able to move past this step if you do not select the same policy for VM Home

    Per VMDK Encryption option

    Per VMDK Encryption option

  3. After you have selected the VM Encryption Policy for each VMDK and VM Home click OK.

    NOTE: You will be required to have the VM powered off.

During this phase vCenter requests an encryption key from KeyControl and presents it to the ESX host where the VM is assigned. This key is referred to as the Key Encryption Key (KEK). The ESX host creates a Data Encryption Key (DEK) and protects it by wrapping the DEK with the KEK. Then the ESX host begins encrypting it.


VM Encryption Done Easily

Once the VM has been encrypted the Encryption status of the VM will state: Encrypted with standard key provider

Encrypted VM status

Encrypted VM

Congratulations! You just encrypted a VM using VMware Encryption.

Summary

Let’s summarize what was covered in this post:

  • We first confirmed that a 2-node Entrust KeyControl v5.4 cluster had been deployed and connected to vCenter
  • Figured out which VM you wanted to encrypt, right-clicked it and edited the VM Storage Policy
  • Lastly, you determined if you wanted to encrypt the entire VM or specific VMDKs and waited for encryption to finish

In a follow-on post I will write about how to perform encryption using the Entrust DataControl Policy Agent. Using the Entrust DataControl Policy gent there is no need to power-off the VM.

I hope this post has helped you.


Here are links to related posts:

If there is something you think I’m missing and feel should be added, please let me know.

Thanks for reading!

Recent posts

See more

Categories

About

This is my personal blog about technical topics including virtualization, storage, networking, backups, and some random IT stuff that strikes my fancy.